When the device detects attack packets on an interface, the device starts
attack defense on the interface.
Procedure
1.Check whether the attack actually occurs
on the interface. //In your case the source attack from
interface g 1/0/0. From command “display arp”, you can determine which
terminal/device may cause the attack. You can isolate that device from network.
2.If an attack actually occurs, locate the
attack source. If no attack occurs, reconfigure the port attack defense
function to ensure that valid protocol packets can be sent to the CPU.
Please
see the configuration example of enabling port attack defense.
When the device detects attack packets on an interface, the device starts
attack defense on the interface.
Procedure
1.Check whether the attack actually occurs
on the interface. //In your case the source attack from
interface g 1/0/0. From command “display arp”, you can determine which
terminal/device may cause the attack. You can isolate that device from network.
2.If an attack actually occurs, locate the
attack source. If no attack occurs, reconfigure the port attack defense
function to ensure that valid protocol packets can be sent to the CPU.
Please
see the configuration example of enabling port attack defense.
Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
Politically sensitive content
Content concerning pornography, gambling, and drug abuse
Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " Privacy."
* Including Third Party’s Trade Secret or No:?
Third Party’s Trade Secret
Third Party’s Trade Secret refers to Third Party’s (other than Huawei’s) technical or commercial information which is unknown to the public, with commercial value, and kept confidential by Third Party. It may include without limitation Price Information, Roadmap, Commercial Authorization, Core Algorithm and Source Code. Should you have any questions, please contact e.support@huawei.com.